Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

654results about How to "Prevent copying" patented technology

Dynamic encoding algorithms and inline message decryption

In general, data exchanged between users is protected using any of various encoding approaches. An example of encoding is encryption, but any kind of encoding may be used. The data used to encrypt the data exchanged between the users, referred to as a “key”, is maintained only in a key repository. Users must obtain a key from the key repository to either encode or decode, encrypt or decrypt data, after which the user's copy of the key is destroyed or otherwise rendered inoperable. A key management policy is employed to control access to the keys maintained by the key repository. Encoding algorithms may be dynamically changed over time. Users may negotiate different algorithms to be used with specific users or messages. Thus, different algorithms may be used between different sets of users depending upon what the member users of those sets negotiate among themselves. The frequency at which algorithms are changed may also be separately negotiated between users. The frequency may vary depending, for example, upon the perceived risk of intrusion by unauthorized third parties, the content of the messages being transmitted, or both. According to an inline message decryption approach, an encoded message is provided to a user in a form that enables the user's client to process the encoded message using conventional client tools and obtain the cleartext message. This eliminates the need for a user's client to be aware of the particular encoding algorithm used to encode the message. Various embodiments of the inline message decryption approach include: a) in-situ decryption; b) remote decryption; and c) data uploading. An approach is also provided for exchanging data between nodes in a network using sets of associated URLs.
Owner:CHECK POINT SOFTWARE TECH INC

Monitoring realization-based on-line examination system and method

The invention discloses a monitoring realization-based on-line examination system and method. The system comprises an examinee user terminal, a manager user terminal, a server terminal, an examination question base, an examination paper generation module and an examination paper base. The examinee user terminal receives examinee logging information and an examinee answer sheet; the manager user terminal sets an examination requirement and carries out real-time monitoring on an examinee answering situation; the server terminal verifies the logging information of the examinee user terminal, responds to an instruction of the manager user terminal, shields responses of two hot keys: Ctrl+V and Ctrl+C, and records clicking situations of a keyboard and a mouse; the examination question base stores single questions of various examination questions; the examination paper base visits the examination question base to generate an examination paper or directly visits and invokes information in the examination paper base to generate an examination paper; and the examination paper base stores various examination papers generated by enterprises. With on-line examination services provided by the system, on the one hand, an examinee can take an examination any time any where; and on the other hand, a manager can monitor an examination process in real time. Therefore, cheating by the examinee can be prevented, thereby ensuring effectiveness as well as fairness and justice of the examination.
Owner:ZHENJIANG RETECH INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products